Term
| How does Cryptography help preserve confidentiality? |
|
Definition
| Ciphertext cannot be read without the key (and correct cipher) |
|
|
Term
| How does Cryptography allow for authentication and control? |
|
Definition
| Assuming the key is secure, an encrypted token could only have been created by the key holder. |
|
|
Term
| How does Cryptography allow for Non-Repudiation? |
|
Definition
| Sender cannot deny the message as only s/he could have created it. |
|
|
Term
| How does Cryptography allow for Integrity and Resiliency? |
|
Definition
| As well as being unreadable, a ciphertext cannot normally be modified or substituted with a different message. |
|
|
Term
| What is making something obscure to a potential interceptor? |
|
Definition
|
|
Term
| What converts plaintext into ciphertext? |
|
Definition
|
|
Term
| What can be used to control the operation of the cipher? |
|
Definition
|
|
Term
| What is the art of breaking or "cracking" cryptographic systems? |
|
Definition
|
|
Term
|
Definition
Message and key are same size.
It is impossible to crack if sufficiently random.
Is only used one time. |
|
|
Term
| What is adding extra bits to a hash, to make similar hashes not appear the same? |
|
Definition
|
|
Term
| What is 128 bit encryption that can move up to 256 bit keys? |
|
Definition
| Advanced Encryption Standard (AES) |
|
|
Term
What are the following elements of?:
oIf the public key encrypts, only the private key can decrypt
oIf the private key encrypts, only the public key can decrypt
oPrivate key cannot be derived from the public key
oPrivate key must be kept secret
oPublic key is easy to distribute (anyone can have it) |
|
Definition
|
|
Term
| Same secret key is used for encryption and decryption. |
|
Definition
|
|
Term
|
Definition
|
|
Term
| Root CA is always offline unless what? |
|
Definition
| They have to issue a new intermediate certification or reissue an intermediate certification. |
|
|
Term
| What allows for a Man-in-the-Middle (MitM) attack? |
|
Definition
| Inadequate authentication and message integrity. |
|
|
Term
|
Definition
| Certificate Revocation List |
|
|
Term
|
Definition
|
|